-Caveat Lector-

-----Original Message-----
From: jean hudon [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, August 24, 1999 1:09 PM
To: Nancie Belle
Subject: FWd Enemies of the State: Authoritarian vs. Libertarian
Internet Visions +Nukes, Deterrence and China

Subj:    Enemies of the  State
Date:   8/24/99 3:01:34 AM Eastern Daylight Time
From:   [EMAIL PROTECTED]
Sender: [EMAIL PROTECTED]
Reply-to:   <A
HREF="mailto:[EMAIL PROTECTED]">[EMAIL PROTECTED]</A>
(Activist Mailing List)
To: [EMAIL PROTECTED]

Activist Mailing List - http://get.to/activist

Insight Magazine
August 20, 1999
By James P. Lucier

Enemies of the  State

In a clash between the authoritarian state and the libertarian vision,

the Clinton administration is seeking draconian control of computers
and encryption.

        ************

Virginia's soft-spoken four-term Republican congressman, Rep. Bob
Goodlatte, may come out of a no-nonsense town in the Blue Ridge, but
he has taken on virtually the entire defense establishment, the
intelligence community and even the FBI with his bill HR850, the
Security and Freedom through Encryption Act, or SAFE. It is a simple
concept, and it has 258 cosponsors in the House. What SAFE would do is

guarantee every American the freedom to use any type of cryptography
anywhere in the world and allow the sale of any type of encryption
domestically. Not such a big deal, is it? How many Americans go around

writing secret messages in disappearing ink after they grow up?

. . . . Actually, it is one of those edge-defying, generation-
splitting, turn-the-world-upside-down moments in history. It is a
struggle between two different visions of American society. One side
sees the private use of encryption as a way to safeguard the records
and property of U.S. citizens from the prying eyes of computer
hackers, thieves, terrorists and the U.S. government. The other side
is the U.S. government, which sees itself as the guarantor of security

in the newly discovered land of cyberspace. And to provide that
security the government says it has to have the power, at any given
moment, to look into anyone's e-mail, bank accounts, financial
transactions, information exports and dangerous ideas. Our whole
practice of governing is based on geographic concepts -- jurisdiction
in delineated districts, authority flowing from citizens voting by
precinct, taxes based on property in a given place or on salaries
reported to and scrutinized by powerful agencies.

. . . . But the Internet is everywhere and nowhere. If people slip
into cyberspace covered in the stealth garment of encryption to
perform transactions, express their ideas, transfer payments and
export technology, who's to know what is happening? How will taxes be
assessed and collected? How will commerce be measured? How will the
professions be regulated if everyone has access to legal or medical
information? What will bureaucrats do without people to boss around?
How will ideas be controlled? For those who believe that strong
government should be the molder and protector of its citizens -- well
then, citizens acting behind the cloak of encryption could be a
fundamental threat to government. They are enemies of the state.

[...]


. . . . Of course, robust encryption available to any citizen might
thwart the special vision of an administration that believes that
government must be the protector of its citizens.

. . . . It may be a touch exaggerated, but many citizens feel like the

eager young criminal lawyer played by Will Smith last year in the
movie Enemy of the State. When Smith unknowingly comes into possession

of evidence that a secret federal agency is committing criminal acts,
he finds himself targeted in a bizarre night-and-day chase through
streets, markets and high-rise buildings -- all with the obligatory
black helicopters hovering overhead.

. . . . Dramatic license aside, there are signs in that events are
inching toward that fantastic scenario. Most disturbing were the
detailed revelations by a panel of the European Parliament that the
United Kingdom and the United States, joined by Canada, Australia and
New Zealand, have been engaged in international surveillance of the
communications of each other's citizens for years in a joint signals-
intelligence consortium code-named ECHELON (see sidebar; for an
earlier report, see news alert!, Aug. 17, 1998). Although Attorney
General Janet Reno and other officials assert that encryption must be
controlled to stop terrorists and child pornography -- two powerful,
but demagogic arguments -- it appears the real reasons lie elsewhere.
After all, as Reno admits, international terrorist Osama bin Laden
already has cryptography and child pornographers are best caught the
old-fashioned way: by baiting them into their own trap. The fact is
that routine use of strong encryption by law-abiding citizens and
enterprises would shut down citizen-surveillance projects such as
ECHELON.

[...]

. . . . The battle to block widespread use of private encryption and
to extend government surveillance has emerged on many fronts in the
last few months:

    The administration has put on a full-court press to block the
    SAFE bill. Goodlatte and his 258 cosponsors are on one side;
    on the other are the president, the secretaries of state and
    defense, the directors of the CIA and FBI and the attorney
    general, who all have risen up to attempt to defeat the
    legislation.

    [..]

    The Justice Department has sought the "cooperation" of private

    industry to exchange security data in eight areas of "critical

    infrastructure,"....

    [...]

    "The NIPC [National Infrastructure Protection Center] was
    established to deter, detect, analyze, investigate and provide

    warnings of cyberthreats and attacks on the critical
    infrastructures of the United States, including illegal
    intrusions into government and private-sector computer
    networks,"

    [...]

    Besides, the source says, banking officials, after meeting
    NIPC, were appalled at the range of information the government

    is seeking -- including detailed access and transaction codes
    of customers.

    [...]


    On Aug. 5, President Clinton issued an executive order setting

    up a "Working Group on Unlawful Conduct on the Internet." The
    working group is to make a report on whether there are enough
    federal laws to deal with unlawful conduct and whether new
    technology and capabilities might be needed for effective
    investigation and prosecution....

    [...]

    The FBI -- which was denied the right to require cell-phone
    companies to install equipment that would give real-time
    information to track the location of cell-phone users (even
    when the instrument is on standby) in the 1994 Communications
    Assistance for Law Enforcement Act -- has been working with
    the Federal Communications Commission to establish standards
    which would do the same thing without legislation.

    [...]

    In addition, the FBI is attempting to collect all numbers
    dialed, "including credit-card and bank-account." The FBI also

    is seeking an enormous increase in capacity: the ability to
    tap one out of 1,000 phone lines in a given locality at the
    same time, or the ability to monitor 74,250 phone lines at
    once -- 10 times the number of surveillance orders in 1993.


U.S. Postmaster General William Henderson proposed on May 17 that the
Internet go postal. He wants the post office to become the custodian
of all e-mail addresses, mapping them to specific geographic
locations, as well as processing bill payments, purchase transactions
and being "the residential deliverer of choice for purchases made on
the Internet." Describing the post office as a trusted third party,
Henderson said, "We would own the physical address and we would
maintain it. All that information that . . . our customers have
developed around a physical address could now migrate through the
Internet and be a part of commerce."

. . . . "The underlying belief is that American citizens really need
to be policed," Shari Steel, director of legal services for the
Electronic Frontiers Foundation, tells Insight. "They are putting it
on themselves to look at every citizen. They are just willing to
trample all over civil liberties to find the isolated criminal. These
issues are clearly related to who has the right to make the decisions
for all of us, the right to make big societal decisions as to what's
good for all of us. Almost all of us online believe that citizens have

the right to protect our integrity. Really, technology gives us the
solutions to protect out autonomy."

[...]


The full report may be found at:
http://www.insightmag.com/articles/story1.html

This will also be of interest to you ...

From: John Owen <[EMAIL PROTECTED]>
To: "'[EMAIL PROTECTED]'" <[EMAIL PROTECTED]>
Subject: Nukes, Deterrence and China
Date: Tue, 3 Aug 1999 11:26:14 -0700


Thank you for the pieces by James Bush and Robert Scheer the past two days.
A discussion of United States nuclear policies is important to the security
of all peoples everywhere.
In the 1960s, it was predicted that 30-40 countries would have nuclear
weapons by today. The fact that there are only eight nuclear states today
is a credit to the restraint of most of the countries of the world. Over
twenty years ago the Latin American countries agreed to make their part of
the world a nuclear weapons free zone. Years ago In South Africa the
government dismantled their nuclear weapons. Any advanced country and
apparently even some of the less advanced countries such as Iraq and
Pakistan, are capable of building nuclear weapons. To prevent the global
spread of nuclear weapons, in 1972 the United States and the other
countries signed the nuclear non-proliferation treaty. Among other things,
the United States and the other nuclear powers agreed to eliminate their
nuclear arsenals as soon as practicable, and in return for this promise the
other countries agreed to forego development of nuclear weapons. Every
year, nuclear abolition is voted for in the United Nations, with only the
United States and one or two allies dissenting. To their credit, every
nuclear country except ours speaks out for a nuclear weapons free world.
 The United States has reaffirmed many times that our nukes are not just
for deterrence. They are for war fighting, whenever conventional munitions
will not get the job done. This policy of first use of nuclear weapons,
forces potential targets such as Russia and China, to keep their missles on
hair trigger alert. The old Soviet Union used to have a no first use
policy, but due to the deterioration of their conventional forces, Russia
like the United States now has a policy of using nuclear weapons first, in
case of a conflict affecting its national interest.  This is a recipe for
global suicide. If the world continues to maintain nuclear arsenals, a
future nuclear holocaust is guaranteed. There have already been several
false alarms.

I think humanity can do better than just to wait passively until we destroy
ourselves. Don't we have an obligation to future generations that may never
be born? Is the human experiment ultimately meaningless? As Professor
Einstein said many years ago, the splitting of the atom has changed
everything except humanity's mode of thinking, thus we drift toward
unparalled catastrophe. The United States with its highly technological
civilization concentrated in a few large cities, is much more at risk from
the threat of accidental nuclear war, than almost any other country. China
especially, with its huge population widely dispersed throughout the
countryside, is more likely to  survive a nuclear conflict with the United
States, than is the United States. If war with China is to come some day, I
would far prefer that it happen in a nuclear free world.


John Owen
2506 Arthur Street
La CA 90065
323 344 8084

DECLARATION & DISCLAIMER
==========
CTRL is a discussion and informational exchange list. Proselyzting propagandic
screeds are not allowed. Substance—not soapboxing!  These are sordid matters
and 'conspiracy theory', with its many half-truths, misdirections and outright
frauds is used politically  by different groups with major and minor effects
spread throughout the spectrum of time and thought. That being said, CTRL
gives no endorsement to the validity of posts, and always suggests to readers;
be wary of what you read. CTRL gives no credeence to Holocaust denial and
nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://home.ease.lsoft.com/archives/CTRL.html

http:[EMAIL PROTECTED]/
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to